预览加载中,请您耐心等待几秒...
1/3
2/3
3/3

在线预览结束,喜欢就下载吧,查找使用更方便

如果您无法下载资料,请参考说明:

1、部分资料下载需要金币,请确保您的账户上有足够的金币

2、已购买过的文档,再次下载不重复扣费

3、资料包下载后请先用软件解压,在使用对应软件打开

基于混沌系统与改进Zig-Zag变换的图像加密方案 Abstract Withtheincreasingamountofdatabeinggeneratedandtransferredovertheinternet,theneedforsecuredatatransmissionhasalsoincreased.Imageencryptionisonewaytoensuretheconfidentialityofdataandpreventunauthorizedaccessortampering.Inthispaper,weproposeanimageencryptionschemebasedonchaossystemandimprovedZig-Zagtransform.Theproposedschemeusesthechaoticmaptogenerateakeystream,whichisusedtopermuteandsubstitutetheimagepixels.TheimprovedZig-Zagtransformisusedtofurtherscrambletheimagedataandimprovethesecurityofthescheme.Theexperimentalresultsshowtheeffectivenessandrobustnessoftheproposedimageencryptionscheme. Introduction Withtherapidgrowthofdigitaldata,datasecurityhasbecomeanincreasinglyimportantissue.Imageencryptionisoneofthewaystoensurethesecurityofdatatransmissionovertheinternet.Imageencryptionreferstotheprocessofconvertingtheoriginalimageintoaformthatisnoteasilyrecognizableorunderstandablebyunauthorizedusers.Theencryptedimagecanonlybedecryptedbytheauthorizedreceiverwiththecorrectkey.Imageencryptionschemesmustberobusttovariousattacks,includingstatistical,differential,andbrute-forceattacks.Inthispaper,weproposeanovelimageencryptionschemebasedonchaossystemandimprovedZig-Zagtransform. RelatedWork Manyimageencryptionschemeshavebeenproposedinrecentyears.Someofthepopulartechniquesincludechaoticmaps,DNAcomputing,andwavelettransforms.Chaoticmapsarewidelyusedinimageencryptionbecauseoftheircomplexbehaviorandsensitivitytoinitialconditions.DNAcomputingisbasedonthenaturalpropertiesofDNAmoleculesandhasbeenusedforimageencryptionandwatermarking.Wavelettransformsareusedtotransformanimageintoitsfrequencyrepresentationandthenuseachaoticmaptoscramblethecoefficients. However,thesetechniquesalsohavesomelimitations,includingslowencryptionspeed,lowrobustness,andhighsensitivitytokeyselection.Inthispaper,weproposeanimageencryptionschemebasedonchaossystemandimprovedZig-Zagtransformtoovercometheselimitations. ProposedMethod Theproposedimageencryptionschemeconsistsoftwomainsta